Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Play Store Reveals Three Malicious Applications for Mining Monero Coins

 

Trend Micro the cyber-security company discovered two malware strains -CpuMiner and JsMiner hanging at the back of three applications even as the malevolent payload ate up the processing power of the infected phone like a parasite with the purpose of mining Monero coins. The applications apparently were tame-free applications, two of which were -one religious prayer application and one wireless scanner.

 

Soon after getting downloaded, the malicious programs would install JavaScript code that Coinhive the mining tool supplier would provide for beginning harvesting Monero coins behind screen. This adversely impacts the battery life and performance of the infected phone.

 

When any crypto-currency miner does its activity it consumes the host device's CPU power as the end-user browses a website which has the mining tool like the ShowTime and Pirate Bay sites. Suppose the end-user has his smart-phone on then it would be attacked with malware-infested applications containing a mining code for crypto-currency that utilizes the smart-phone's power for producing digital coins. Hackread.com posted this, October 31, 2017.

 

After finding the three applications, Trend Micro's IT security experts observed that the applications relied on dynamic JavaScript installation along with local code's injection for bypassing security detection. The IT security researchers identified 3 programs available which could be pulled down for supplying to the application bazaar and which were clandestinely consuming the unused CPU power from the end-users' phones for mining Monero, with the help of code that Coinhive created. The mining applications camouflaged a wallpaper assortment, one Wi-Fi safety application as well as software for providing rosary prayers to Catholics.

 

The application pulled down from Play Store needs to be opened to let it configure onto the smart-phone over some seconds after which Notification History Log would activate on the device having Android 4.4 KitKat alternatively a higher version that the latest phone models have.

 

Presently, it'd be appropriate to do a checking of every application's permission on the end-user's phone via navigating to Settings then Apps then selecting any application, pressing on 'Menu' followed with highlighting 'All Permissions.'

 

For end-users specifically worried about Activity Recognition, it would be worthwhile uninstalling the application which seeks the permission.

» SPAMfighter News - 11/6/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next